1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
3 years ago
10

How did these social media platforms affect or change the way you communicate with other people?

Computers and Technology
1 answer:
amid [387]3 years ago
8 0

Answer:

The importance of social media in communication is a constant topic of discussion. Online communication has brought information to people and audiences that previously could not be reached. It has increased awareness among people about what is happening in other parts of the world.

Social media networks allow us the opportunity to share opinions with a far wider audience. Another big change that has occurred is that there is now no filter on the way we speak. In the past, unless you spoke to people directly, you had no way to get your message across regardless of your freedom of speech.

Explanation:

<h2>be happy</h2>
You might be interested in
You have just connected a new computer to your network. The network user static IP addressing. You find that the computer can co
choli [55]

Answer:

Default gateway

Explanation:

The default gateway would be needed to change for the configuration value because when plugged to the computer system into other's network. The Internet Protocol addressing for network users that is static. Then, the other user finds the system can connect on a similar subnet with hosts and not with hosts on another subnet and no further computer systems have facing the problem.

3 0
4 years ago
Read 2 more answers
6 external parts of computer
vivado [14]
<span>External computer parts are those that connect to the case, often to provide ways to input or output data.

Here are a 6 examples of external parts:
</span>Monitor
Keyboard
Mouse
Speakers
Printer
External Hard Drives

I hope this has helped you.
6 0
3 years ago
Read 2 more answers
Why are id thieves hard to catch?
Paladinen [302]
Because they will change their identity and therefore they will never have the same name for a long period of time . So when they commit a crime , they will be difficult to find and catch
5 0
3 years ago
The five major functional areas consist of the Command Staff as a whole and the four sections in the General Staff: Operations,
inn [45]

The five major functional areas consist of the Command Staff as a whole and the four sections in the General Staff: Operations, Planning, Logistics, and Finance and Administration. Of these, the planning section consists of resource unit, situation unit, demobilization unit, and the documentation unit.

<u>Explanation:</u>

The Resource unit looks after the allocation, analysis, and organization of resources.

The situation unit collects information about The status of a particular incident that takes place in an organization.

The Demobilization unit is responsible for preparing a demobilization plan. It is responsible for the safety of persons and machines in case of any incident.

The Documentation unit looks after all the documents and prepares them on time.

8 0
3 years ago
How do you know a resource is credible
Alisiya [41]

Answer:

There are several main criteria for determining whether a source is reliable or not.

1) Accuracy. Verify the information you already know against the information found in the source

2) Authority. Make sure the source is written by a trustworthy author and/or institution

3) Currency

4) Coverage

Explanation:

5 0
3 years ago
Other questions:
  • Which amendment discussed in the unit do you think has the greatest effect on your life? Why?
    14·1 answer
  • Why is it important to back up data on a computer before you burn-in test the cpu?
    9·1 answer
  • State what is meant by the terms: Parallel data transmission ...................................................................
    8·1 answer
  • How do you program a computer
    7·1 answer
  • PLEASE HELP what is the mechanical advantage of a wheel with a radius of 8.0 cm connected with a axle with a radius of 2.5 cm?
    12·2 answers
  • Write a program that prompts the user to enter a number then counts the number of odd numbers and even numbers the user enter. T
    15·1 answer
  • 2. Suppose a computer using direct mapped cache has 220 words of main memory and a cache of 32 blocks, where each cache block co
    10·1 answer
  • Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network comprom
    5·1 answer
  • Create a dynamic array of 100 integer values named myNums. Use a pointer variable (like ptr) which points to this array. Use thi
    6·1 answer
  • 6) Read the article posted on The Verge entitled How to fight lies, tricks, and chaos online and summarize the four steps. Then
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!